{"type":"conference","publication":"2022 IEEE Symposium on Security and Privacy (SP)","publication_status":"published","citation":{"ieee":"J. Jancar et al., “‘They’re not that hard to mitigate’: What Cryptographic Library Developers Think About Timing Attacks,” 2022, doi: 10.1109/sp46214.2022.9833713.","chicago":"Jancar, Jan, Marcel Fourné, Daniel De Almeida Braga, Mohamed Sabt, Peter Schwabe, Gilles Barthe, Pierre-Alain Fouque, and Yasemin Acar. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 2022. https://doi.org/10.1109/sp46214.2022.9833713.","ama":"Jancar J, Fourné M, Braga DDA, et al. “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. In: 2022 IEEE Symposium on Security and Privacy (SP). IEEE; 2022. doi:10.1109/sp46214.2022.9833713","bibtex":"@inproceedings{Jancar_Fourné_Braga_Sabt_Schwabe_Barthe_Fouque_Acar_2022, title={“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks}, DOI={10.1109/sp46214.2022.9833713}, booktitle={2022 IEEE Symposium on Security and Privacy (SP)}, publisher={IEEE}, author={Jancar, Jan and Fourné, Marcel and Braga, Daniel De Almeida and Sabt, Mohamed and Schwabe, Peter and Barthe, Gilles and Fouque, Pierre-Alain and Acar, Yasemin}, year={2022} }","short":"J. Jancar, M. Fourné, D.D.A. Braga, M. Sabt, P. Schwabe, G. Barthe, P.-A. Fouque, Y. Acar, in: 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022.","mla":"Jancar, Jan, et al. “‘They’re Not That Hard to Mitigate’: What Cryptographic Library Developers Think About Timing Attacks.” 2022 IEEE Symposium on Security and Privacy (SP), IEEE, 2022, doi:10.1109/sp46214.2022.9833713.","apa":"Jancar, J., Fourné, M., Braga, D. D. A., Sabt, M., Schwabe, P., Barthe, G., Fouque, P.-A., & Acar, Y. (2022). “They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks. 2022 IEEE Symposium on Security and Privacy (SP). https://doi.org/10.1109/sp46214.2022.9833713"},"status":"public","year":"2022","user_id":"125442","date_created":"2026-04-30T09:27:16Z","author":[{"last_name":"Jancar","full_name":"Jancar, Jan","first_name":"Jan"},{"first_name":"Marcel","last_name":"Fourné","full_name":"Fourné, Marcel"},{"first_name":"Daniel De Almeida","full_name":"Braga, Daniel De Almeida","last_name":"Braga"},{"first_name":"Mohamed","last_name":"Sabt","full_name":"Sabt, Mohamed"},{"full_name":"Schwabe, Peter","last_name":"Schwabe","first_name":"Peter"},{"first_name":"Gilles","full_name":"Barthe, Gilles","last_name":"Barthe"},{"first_name":"Pierre-Alain","full_name":"Fouque, Pierre-Alain","last_name":"Fouque"},{"last_name":"Acar","full_name":"Acar, Yasemin","first_name":"Yasemin"}],"publisher":"IEEE","date_updated":"2026-04-30T09:32:44Z","_id":"65532","doi":"10.1109/sp46214.2022.9833713","title":"“They’re not that hard to mitigate”: What Cryptographic Library Developers Think About Timing Attacks"}